![]() ![]() We looked at big name providers like Amazon AWS and Microsoft Azure but also the growing non-corporate options where you can rent a person’s computer at cost per hour. The data was based on how long it would take a consumer-budget hacker to crack your password hash using a desktop computer with a top-tier graphics card and then how long an organized-crime-budget hacker would take leveraging cloud compute resources. In 2022, we shared our update to a colorful infographic table that showed the relative strength of a hashed password against a cracking attempt, based on the password’s length, complexity, hashing algorithm used by the victim, and the hardware used by the attacker. Got a question or comment? Leave it below or message us on your favorite social media platform. So we’ll talk through the data, our assumptions, and oh, you’re going to see a LOT of variations of the password table. ![]() While the data fits nicely into the table above, things aren’t as as simple as they look. But for those of you that want to know about the “how” then you’ve come to the right place because we’re going to walk you through our methodology. Since 2020, we’ve conducted a lot of research to develop and present the Hive Systems Password Table. ![]()
0 Comments
Leave a Reply. |